scholarly journals ANALYZING AND EVALUATING THE SECURITY STANDARDS IN WIRELESS NETWORK: A REVIEW STUDY

2020 ◽  
Vol 46 (1) ◽  
pp. 32-39
Author(s):  
Intisar Shadeed Al-Mejibli ◽  
Dr. Nawaf Rasheed Alharbe

Wireless networks used widely in office, home, and public places so security is one of the significant issues to keep the transmitted information safe. The applied security standards have been developed in response to the demand of high security and the developed hardware with software. Currently, the available security standards are (WEP, WPA, WPA2 and under development WPA3). These security standards are different in the offered security level base on the employed authentication method and encryption algorithms. The major objective of this paper is studying security standards and analyzing them based on their features. In addition to presenting a detailed review about WPA3 and its improvements over the older security standards. The conducted evaluations explained the differences among the Wi-Fi security standards in term of the offered security level, software and hardware requirements.

Author(s):  
Dr. Akey Sungheetha ◽  
Dr. Rajesh Sharma R

Handling Keys in the distributed wireless network is one of the most popular options that ensures the protection of data that are transmitted under various circumstances. It even assists the setting up, reversal and the looking after of keys across diverse. So this makes it requisite to process and produce a corporate key that is secret and as well as distribute it across the network that is decentralized. This sort of key is termed as the shared key. The shared key aids in the procedures of encrypting and decrypting the information’s that are to be transmitted. Multitudes of applications are developed based on the decentralized wireless network such as wireless adhoc network, mobile adhoc networks, wireless sensor networks etc. are suggested with the secret key protection to enhance the security level while transmitting data. The shared key transfer protocol (SKTP) procedure accomplishes encryption /decryption for the message to be transferred it uses a group of key and shares them across a several transmissions that takes place across the head of the cluster and the nodes in the clustered paradigm. This shared collection of keys allows the consumer to encode and decode the message that is to be conveyed for all the consumers in a group enabling a member in the cluster to work together with the other member in the group around the data discovery. So the paper aims in establishing a novel shared key transfer protocol (N-SKTP) that is dynamic in nature and practically possible to secure the information transfer across the devices in the distributed wireless network. The N-SKTP utilizes the pubic key cryptography to develop a shared key group (SKG) for the manifold transmission in the network. The investigation of the performance of the proposed protocol using the network simulator -2 experimentally demonstrates the proficiency of the N-SKTP in the distributed wireless networks with limited resources.


2015 ◽  
Vol 14 (6) ◽  
pp. 5809-5813
Author(s):  
Abhishek Prabhakar ◽  
Amod Tiwari ◽  
Vinay Kumar Pathak

Wireless security is the prevention of unauthorized access to computers using wireless networks .The trends in wireless networks over the last few years is same as growth of internet. Wireless networks have reduced the human intervention for accessing data at various sites .It is achieved by replacing wired infrastructure with wireless infrastructure. Some of the key challenges in wireless networks are Signal weakening, movement, increase data rate, minimizing size and cost, security of user and QoS (Quality of service) parameters... The goal of this paper is to minimize challenges that are in way of our understanding of wireless network and wireless network performance.


Author(s):  
Hafiz Munsub Ali ◽  
Jiangchuan Liu ◽  
Waleed Ejaz

Abstract In densely populated urban centers, planning optimized capacity for the fifth-generation (5G) and beyond wireless networks is a challenging task. In this paper, we propose a mathematical framework for the planning capacity of a 5G and beyond wireless networks. We considered a single-hop wireless network consists of base stations (BSs), relay stations (RSs), and user equipment (UEs). Wireless network planning (WNP) should decide the placement of BSs and RSs to the candidate sites and decide the possible connections among them and their further connections to UEs. The objective of the planning is to minimize the hardware and operational cost while planning capacity of a 5G and beyond wireless networks. The formulated WNP is an integer programming problem. Finding an optimal solution by using exhaustive search is not practical due to the demand for high computing resources. As a practical approach, a new population-based meta-heuristic algorithm is proposed to find a high-quality solution. The proposed discrete fireworks algorithm (DFWA) uses an ensemble of local search methods: insert, swap, and interchange. The performance of the proposed DFWA is compared against the low-complexity biogeography-based optimization (LC-BBO), the discrete artificial bee colony (DABC), and the genetic algorithm (GA). Simulation results and statistical tests demonstrate that the proposed algorithm can comparatively find good-quality solutions with moderate computing resources.


2018 ◽  
Vol 6 (5) ◽  
pp. 369-376
Author(s):  
Pradeep ◽  
Manjunath

The wireless communication technology gaining importance in extreme conditions in a very effective way due to its benefits. Compared to wired networks, wireless networks have many benefits in terms of flexibility, cost, and mobility. Wireless networks can be easily hacked by the outsiders if there is no proper security. Because of its increasing popularity, wireless networks need proper security measures in addition to the normal protections such as firewalls, virus detectors, etc. Providing the required additional security to the wireless networks is a challenging task. Security can be maintained by providing data authenticity, integrity confidentiality, and authorization. A survey on the security of wireless networks is put forward that discusses various techniques which help in protecting the network and a cryptic secure scheme has been proposed which helps to enhance the security standards in the wireless medium.


Author(s):  
Ibraim Didmanidze ◽  
Zebur Beridze ◽  
Vladimir Zaslavski

In the people's lives wireless networks play a big role. It is necessary to understand the basic concept of wireless networks, to consider the security issues related to them, and then observe how they work and what benefits they can bring in different cases. In this regard the given research paper presents the fundamental principles of security as well as related open questions. It reviews the security issues of the wireless networks. Security of protocols of wireless network routing has become an urgent necessity to stimulate the network launching and expand the area of its usage. Therefore, the presented research paper proposes and defines different solutions and concepts for security.  


2017 ◽  
Vol 17 (1) ◽  
pp. 104-112 ◽  
Author(s):  
Zijuan Shi ◽  
Gaofeng Luo

Abstract Auction is often applied in cognitive wireless networks due to its fairness properties and efficiency. To solve the allocation issues of cognitive wireless network inamulti-band spectrum, multi-item auction mechanism and models were discussed in depth. Multi-item highest price sealed auction was designed for cognitive wireless networks’multi-band spectrum allocation algorithm. This algorithm divided the spectrum allocation process into several stages which was along with low complexity. Experiments show that the algorithm improves the utilization of spectrum frequency, because it takes into account the spectrum owner’s economic efficiency and the users’equity.


Information security is an important task on multimedia and communication world. During storing and sharing maintaining a strategic distance from the outsider access of information is the difficult one. There are many encryption algorithms that can provide data security. In this paper two of the encryption algorithms namely AES and RSA are implemented for color images. AES (Advanced Encryption Standard) is a symmetric key block cipher published in December 2001 by NSIT (National Institute of Standards and Technology). RSA (Rivest-Shamir-Adleman) is an asymmetric key block cipher. It uses two separate keys, one for encryption called the public key and other for decryption called the private key. Both the implementation and analysis are done in Matlab. The quality and security level of both the algorithms is analysed based on various criteria such as Histogram analysis, Correlation analysis, Entropy analysis, NPCR (Number of Pixel Change Rate), UACI (Unified Average Changing Intensity), PSNR (Peak Signal-to-Noise Ratio).


Author(s):  
Gabriel PETRICĂ

Solutions that can be implemented to secure a LAN include firewalls and intrusion detection / prevention systems (IDS / IPS). For a wireless network, security is a challenge considering the specific elements of this type of network: the physical area from which the connection is possible, and the weaknesses of the protocols used for data encryption. This article presents a case study on the most widely used protocols (WEP, WPA and WPA2) to secure wireless networks and the methodology by which passwords can be decrypted using Kali Linux distribution - available for free on the Internet - and applications included in this operating system.


Author(s):  
Nidhi Sharma ◽  
Priyanka Ahlawat

The 5th Generation of wireless network technology (5G) is a rising set of cellular technologies, specifications and projected standards that promise to dramatically improve the speed and responsiveness of wireless networks. The arrival of 5G guarantees new architectures for connecting billions of IoT (Internet of Things) devices and introduces a bunch of development challenges for sensible applications. Enterprises measure are trying to find out the solutions for omnipresent property and near-real-time remote solutions and management capabilities for mission-critical IoT systems and 5G is here to answer that decision.


2016 ◽  
pp. 749-777
Author(s):  
Sulata Mitra

The next generation wireless networks will be heterogeneous wireless environments because of the coexistence of a large variety of wireless access technologies. The different networks have different architectures and protocols. So it is difficult for a user to roam from one radio system to another which can be solved by using the Internet protocol as a common interconnection protocol as it needs no assumptions about the characteristics of the underlying technologies. An all-IP wireless network is an IP-based wireless access system that makes wireless networks more robust, scalable, and cost effective. The nodes in such a network are mobile nodes as they change their location and point of attachment to the Internet frequently. The mobility management is an important research issue in an all-IP wireless network for providing seamless roaming facility to mobile nodes from one wireless system to another. The dynamic resource management is also required in this environment to ensure sufficient resource in the selected route for transmission or reception of the data packets during seamless roaming of the mobile nodes. This chapter is aimed at the researchers and the policy makers making them aware of the different means of mobility management and resource management for mobile nodes in all-IP wireless networks.


Sign in / Sign up

Export Citation Format

Share Document